MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection

Ben_
New here

MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection

Hi everybody,

 

I have a malware-cnc named MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection with the snort-rule 1-60324 that affected all of the APs of m one of my clients. The connections all came from Hong Kong. Since I didn't see any topics about this in this forum, I was wondering if someone was affected by this malware and what actions they had done to resolve this problem.

 

Thanks everyone.

 

Sincerely,

 

Ben_

2 Replies 2
alemabrahao
Kind of a big deal
Kind of a big deal

Have you tried to block the source IP or the Country?

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.

I thought that I blocked this country but I did not so I will block it thank you.

Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels